Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware

Total Page:16

File Type:pdf, Size:1020Kb

Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware applied sciences Article Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware Claudinei Morin da Silveira 1,† , Rafael T. de Sousa Jr. 1,† , Robson de Oliveira Albuquerque 1,2,† , Georges D. Amvame Nze 1,† , Gildásio Antonio de Oliveira Júnior 1,† and Ana Lucila Sandoval Orozco 1,2,† and Luis Javier García Villalba 2,*,† 1 Cyber Security INCT Unit 6, Laboratory for Decision-Making Technologies (LATITUDE), Department of Electrical Engineering (ENE), Technology College, University of Brasilia (UnB), Brasilia-DF 70910-900, Brazil; [email protected] (C.M.d.S.); [email protected] (R.T.d.S.J.); [email protected] (R.d.O.A.); [email protected] (G.D.A.N.); [email protected] (G.A.d.O.J.); [email protected] (A.L.S.O.) 2 Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, Spain * Correspondence: [email protected] † These authors contributed equally to this work. Received: 16 May 2020; Accepted: 12 June 2020; Published: 20 June 2020 Abstract: This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorized access protection mechanism enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active. Studies also demonstrate that data preservation and integrity are maintained, which is critical to a digital forensic process. Keywords: Mobile Device Forensics; In-System Programming; Combination Firmware; physical/logical data acquisition; android data extraction 1. Introduction In recent years, our society has experienced an accelerated process of computerization, thus becoming highly interconnected. In May 2019, in Brazil alone, public records pointed to over 230 million smartphones in use. If we add up laptops and tablets to that number, there were then 324 million portable devices, i.e., approximately 1.6 portable devices per inhabitant [1]. Appl. Sci. 2020, 10, 4231; doi:10.3390/app10124231 www.mdpi.com/journal/applsci Appl. Sci. 2020, 10, 4231 2 of 29 With the evolution of mobile devices, a large part of the population has been replacing the computer by the smartphone to perform most tasks involving technology, for example, exchanging messages, sending e-mails, making online payments, etc. According to the StatCounter (Web traffic analysis website) [2], smartphones account for 51.69% of computing devices (smartphones, tablets, and computers) in use worldwide. Mobile devices are used for a variety of tasks, such as sending or receiving text or voice messages, images, chatting by voice or video calls, watching videos, sending or receiving e-mail, making bank transactions, capturing and manipulating images, using applications for health care, relationships, social networks, monitoring of physical activities, mobility and traffic and even to store and display digital documents. In Brazil, we can mention as an example some government services applications of interest to the citizen, such as the Voter Card, the Vehicle Registration and Licensing Certificate, and the National Driver’s License. With technological advances, it has become common for mobile devices to receive constant hardware and software improvements. With each new device launched, a new System on Chip (SoC) is employed, which is more modern, faster, and more energy-efficient, in addition to expanding storage capacity. New mechanisms to protect against unauthorized access are also frequently implemented or improved. Numerous manufacturers already produced cell phones and marketed them globally before the appearance of the Android operating system (OS). After that, they started to invest in hardware development so that their devices started to run the new OS. New manufacturers have also emerged, focusing on the global market or the Asian market, whose consumer public has quite significant numbers. South Korean Samsung is the manufacturer that holds the largest share of the global mobile device market [3] and runs the Android OS, making it the most widely used OS worldwide [4]. Even before the Android OS became the most used OS, this system has been considered an important source of information. As remarked by Simão et al. [5], Android OS constitute a large repository of information in a forensic perspective, both on-site as well as provided remotely. Modern mobile devices are a rich source of data that can be forensic evidence in investigation processes and security analysis. Such devices increasingly have more storage space, connectivity options, and multitask ability, making them the first option for countless users. Currently, devices that run the Android OS and its variations are more accessible in the global market. That turns them into natural candidates in forensic analysis and investigation processes. When it comes to security and digital forensics, analysts strive to acquire and analyze data from mobile devices. The diversity of technology used on mobile devices, the accumulation of digital evidence, the lack of standardized extraction methodologies, and the lack of necessary training characterize challenges that hinder or prevent data acquisition [6]. Companies that develop technologies for digital forensics are also affected by the diversity of components and manufacturers of mobile devices, as they cannot be effective and efficient in all models or in all manufacturers. The gaps left by such companies are also a barrier to law enforcement forces. Files stored in digital format are considered digital evidence, including audio, video, and image files, and even the software or the hardware itself. It is noteworthy that such files and devices can be part of the investigation of most crimes in the digital environment. Therefore, they must be adequately investigated and protected against alteration, maintaining protection under the chain of custody. The Mobile Device Forensics is characterized by difficulties in accessing device data, the effort to unlock or bypass security mechanisms and obtain data, and often, by the inability to obtain the entire volume of data contained in the device. One is also feature by the fact that it is more complex than traditional computer forensics, requiring better-trained teams and specialized equipment to obtain legally acceptable results. Unlike traditional Forensic Computing, where any intervention in the system must be avoided at all costs, in forensics on mobile devices it is necessary to perform access and make interventions directly on the hardware for possible attempts to bypass the access block mechanisms, and also install Appl. Sci. 2020, 10, 4231 3 of 29 elevation of privilege applications. However, the correct use of techniques allows to preserve the evidence, and consequently, the legitimacy of the obtained evidence. Figure1 represents, in a summarized way, the steps of a methodology that can be applied to mobile forensics. Figure 1. Steps of forensic methodology. With regard to mobile device forensics, the scenario for obtaining evidence may also be different. We will briefly address each of the steps of the methodology, always aiming at obtaining the legality of the actions. 1. Evidence identification: As it is a mobile device, its identification may be more difficult, as the offender tries to hand over another device in place of the one who actually has the evidence. Therefore, it is essential to determine which fact needs to be clarified and which devices should be analyzed. It is important to record all details of the location and the seized items. 2. Preservation of evidence: The device to be analyzed must always be handled with gloves so that the fingerprints of the device user are preserved. Although it is not part of the acquisition and analysis of digital evidence, such evidence may be relevant to other forensic sciences. The device should be kept, whenever possible, in the state in which it was seized. If it is seized turned-off, it must remain off. Otherwise, it is also important to put the device in airplane mode, to prevent it from receiving new calls, SMS, creating new itinerary records by GPS, avoiding false positives during the analysis process, or even, that the data may be erased remotely. If this is not possible, a faraday bag must be used to transport the device to the laboratory where the data will be acquired. All features of the device must be documented. 3. Chain of custody: Chain of custody, in the legal context,
Recommended publications
  • Physical and Cyber Crime Detection Using Digital Forensic Approach: a Complete Digital Forensic Tool
    Jain Nilakshi et al., International Journal of Advance Research, Ideas and Innovations in Technology. ISSN: 2454-132X Impact factor: 4.295 (Volume3, Issue1) Available online at: www.ijariit.com Physical and Cyber Crime Detection using Digital Forensic Approach: A Complete Digital Forensic Tool Dr. Nilakshi Jain Neha Bhanushali Sayali Gawade Gauri Jawale Information Technology Information Technology Information Technology Information Technology Department Department Department Department Shah and Anchor kutchhi Shah and Anchor kutchhi Shah and Anchor kutchhi Shah and Anchor kutchhi Engineering college Engineering college Engineering college Engineering College nilakshijain1986@gmail. nehabhanushali2017@g [email protected] [email protected] com mail.com Abstract— Criminalization may be a general development that has significantly extended in previous few years. In order, to create the activity of the work businesses easy, use of technology is important. Crime investigation analysis is a section records in data mining plays a crucial role in terms of predicting and learning the criminals. In our paper, we've got planned an incorporated version for physical crime as well as cybercrime analysis. Our approach uses data mining techniques for crime detection and criminal identity for physical crimes and digitized forensic tools (DFT) for evaluating cybercrimes. The presented tool named as Comparative Digital Forensic Process tool (CDFPT) is entirely based on digital forensic model and its stages named as Comparative Digital Forensic Process Model (CDFPM). The primary step includes accepting the case details, categorizing the crime case as physical crime or cybercrime and sooner or later storing the data in particular databases. For physical crime analysis we've used k- means approach cluster set of rules to make crime clusters.
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • RELEASE NOTES UFED PHYSICAL ANALYZER, Version 5.4 | November 2016 UFED LOGICAL ANALYZER, UFED READER
    NOW SUPPORTING 20,854 DEVICE PROFILES +2,851 APP VERSIONS UFED TOUCH2, UFED TOUCH, UFED 4PC, RELEASE NOTES UFED PHYSICAL ANALYZER, Version 5.4 | November 2016 UFED LOGICAL ANALYZER, UFED READER HIGHLIGHTS WE’VE ADDED SUPPORT TO MORE MOTOROLA ANDROID DEVICES! DEVICE SUPPORT Physical extraction and decoding from 26 popular Motorola Android devices ◼ Bootloader-based physical extraction for 17 MTK Android (up to and including OS 5.0.1). devices running the following MediaTek chipsets: MT6735 and MT6753. ◼ Physical extraction and decoding from 26 popular A BRAND NEW USER INTERFACE Motorola Android devices. Due to popular demand, we ◼ Following the previous announcement in version 5.1, are excited to introduce the we have added physical extraction while bypassing new interface for UFED Physical user lock for 18 additional Huawei devices, running Analyzer, UFED Logical Analyzer and UFED Reader 5.4. HiSilicon chipsets. We have redesigned the user interface to deliver a more ◼ Logical extraction and decoding is enabled for the new intuitive user experience. Google Pixel Android devices (Apps data not included). APPS SUPPORT ◼ 26 new Applications supported for iOS and PINPOINT YOUR SUBJECTS’ Android devices. LOCATIONS WITH MORE ACCURACY! ◼ Facebook Messenger: Decoding supported for multiple users of a single device. ◼ 569 updated application versions. FUNCTIONALITY ◼ Pinpoint your subjects’ locations with more accuracy. ◼ Organize and review case evidence with enhanced To fully utilize the large volume of locations data available in a searching, filtering and grouping capabilities. mobile device, UFED Physical Analyzer 5.4 allows you to convert ◼ Analyze more data in Timeline view quicker. the BSSID values (wireless networks) and cell towers into location ◼ Identify critical case information up to 50% faster.
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz Allen Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Digital Forensic Research: Current State-Of-The-Art
    Digital Forensic Research: Current State-of-the-Art Sriram Raghavan Queensland University of Technology Brisbane, Queensland 4000, AUSTRALIA [email protected] Abstract—Digital Forensics is the process of employing scientific last year, fully 45.6 percent of them reported they’d been the principles and processes analyze electronically stored subject of at least one targeted attack. According to the information to determine the sequence of events which led to a 2010/11 CSI Computer Crime Survey [60], almost 46% of the particular incident. In this digital age, it is important for respondents were affected by at least one form of computer researchers to become aware of the recent developments in this crime. According to 2010 Gallup Computer Crime survey dynamic field and understand scope for the future. The past decade has witnessed significant technological advancements to [73], 11% of American adults report that they were a victim of aid during a digital investigation. Many methodologies, tools and a computer or Internet crime on their home computer in the techniques have found their way into the field designed on past year, up from the 6% to 8% levels found in the previous forensic principles. Digital forensics has also witnessed many seven years. The 2012 Indian Risk survey [71] indicates that innovative approaches that have been explored to acquire and Computer and Internet crime remains the single largest source analyze digital evidence from diverse sources. In this paper, we of national threat at 10.81% closely followed by terrorism at review the research literature since 2000 and categorize 10.43%.
    [Show full text]
  • Barometer of Mobile Internet Connections in Russia Publication of Th May 06 , 2020
    Barometer of Mobile Internet Connections in Russia Publication of th May 06 , 2020 2019 Report nPerf is a trademark owned by nPerf SAS, 87 rue de Sèze 69006 LYON – France. Contents 1 Summary of results ...................................................................................................................... 2 1.1 Summary table and nPerf score, all technologies combined .............................................. 2 1.2 Our analysis ........................................................................................................................... 3 2 Overall results 2G/3G/4G ............................................................................................................. 4 2.1 Data amount and distribution ............................................................................................... 4 2.2 Success rate 2G/3G/4G ........................................................................................................ 4 2.3 Download speed 2G/3G/4G .................................................................................................. 5 2.4 Upload speed 2G/3G/4G ....................................................................................................... 6 2.5 Latency 2G/3G/4G ................................................................................................................ 7 2.6 Browsing test 2G/3G/4G....................................................................................................... 8 2.7 Streaming test 2G/3G/4G ....................................................................................................
    [Show full text]
  • Current and Future Trends in Mobile Device Forensics: a Survey
    Current and Future Trends in Mobile Device Forensics: A Survey KONSTANTIA BARMPATSALOU, TIAGO CRUZ, EDMUNDO MONTEIRO, and PAULO SIMOES, Centre for Informatics and Systems of the University of Coimbra, Department of Informatics (CISUC/DEI), University of Coimbra, Portugal Contemporary mobile devices are the result of an evolution process, during which computational and networking capabilities have been continuously pushed to keep pace with the constantly growing workload requirements. This has allowed devices such as smartphones, tablets and Personal Digital Assistants (PDAs) to perform increasingly complex tasks, up to the point of efficiently replacing traditional options such as desktop computers and notebooks. However, due to their portability and size, these devices are more prone to theft, to become compromised or to be exploited for attacks and other malicious activity. The need for investigation of the aforementioned incidents resulted in the creation of the Mobile Forensics (MF) discipline. MF, a sub-domain of Digital Forensics (DF), is specialized in extracting and processing evidence from mobile devices in such a way that attacking entities and actions are identified and traced. Beyond its primary research interest on evidence acquisition from mobile devices, MF has recently expanded its scope to encompass the organized and advanced evidence representation and analysis of future malicious entity behavior. Nonetheless, data acquisition still remains its main focus. While the field is under continuous research activity, new concepts such as the involvement of Cloud Computing in the MF ecosystem and the evolution of enterprise mobile solutions – particularly Mobile Device Management (MDM) and Bring Your Own Device (BYOD) – bring new opportunities and issues to the discipline.
    [Show full text]
  • About the AAFS
    American Academy of Forensic Sciences 410 North 21st Street Colorado Springs, Colorado 80904 Phone: (719) 636-1100 Email: [email protected] Website: www.aafs.org @ AAFS Publication 20-2 Copyright © 2020 American Academy of Forensic Sciences Printed in the United States of America Publication Printers, Inc., Denver, CO Typography by Kathy Howard Cover Art by My Creative Condition, Colorado Springs, CO WELCOME LETTER Dear Attendees, It is my high honor and distinct privilege to welcome you to the 72nd AAFS Annual Scientific Meeting in Anaheim, California. I would like to thank the AAFS staff, the many volunteers, and everyone else who have worked together to create an excellent program for this meeting with the theme Crossing Borders. You will have many opportunities to meet your colleagues and discuss new challenges in the field. There are many workshops and special sessions that will be presented. The Interdisciplinary and Plenary Sessions will provide different views in forensic science—past, present, and future. The Young Forensic Scientists Forum will celebrate its 25th Anniversary and is conducting a workshop related to the meeting theme. More than 1,000 presentations are scheduled that will provide you with more insight into the developments in forensic science. The exhibit hall, always interesting to explore, is where you will see the latest forensic science equipment, technology, and literature. The theme Crossing Borders was chosen by me and my colleagues at the Netherlands Forensic Institute (NFI). We see many definitions of crossing borders in forensic science today. For the 2020 meeting, six words starting with the letters “IN” are included in the theme.
    [Show full text]
  • Galaxy A10e Owners Manual
    Galaxy A10e Owners Manual Galaxy A10e. 3. Galaxy A20. 4. Assemble your device. 5. Charge the battery. 6. Accessories. 6. Start using your device. 7. Use the Setup Wizard. 7. Transfer data. Information about the Samsung Galaxy A10e can be found in the user manual. Note: These instructions are easier to follow on a computer. 100%. Back Step 1. Check out our support resources for your Galaxy A10e SM- A102U to find manuals, specs, features, and FAQs. You can also register your product to gain access. Manual - Samsung Galaxy A10 - Android 9.0 - Device Guides. Galaxy A10e Owners Manual ===> Download/Read Here This is the official Samsung Galaxy A10e User Guide in English provided from the manufacturer. If you are looking for detailed technical specifications, please. Samsung Galaxy A10e SM-A102U, SM-A102N, SM-A102W Manual / User Guide Download PDF Free My Store. Jump to Device tutorials and user guide - Device tutorials and user guide, First time use, Transferring data. In the box. The Samsung Galaxy A10e comes. The Samsung S102DL is a variant of the Samsung Galaxy A10e coming to Tracfone, Net10, and StraightTalk. Samsung S102DL user manual. Tracfone has. Download user manual. Description. With the Samsung Galaxy A10e, you get exactly what you need with the performance and reliability from a brand you can. Galaxy A10e. 3. Galaxy A20. 4. Assemble your device. 5. Charge the battery. 6. Accessories. 6. Start using your device. 7. Use the Setup Wizard. 7. Transfer data. How to access User Manual in SAMSUNG Galaxy A10e? First of all, open the list of all Apps.
    [Show full text]
  • Graduate Prospectus2014 Institute of Space Technology
    Graduate Prospectus2014 Institute of Space Technology we HELP YOU ACHIEVE YOUR AMBITIONS P R O S P E C T U S 2 141 INSTITUTE OF SPACE TECHNOLOGY w w w . i s t . e d u . p k To foster intellectual and economic vitality through teaching, research and outreach in the field of Space Science & Technology with a view to improve quality of life. www.ist.edu.pk 2 141 P R O S P E C T U S INSTITUTE OF SPACE TECHNOLOGY CONTENTS Welcome 03 Location 04 Introduction 08 The Institute 09 Facilities 11 Extra Curricular Activities 11 Academic Programs 15 Department of Aeronautics and Astronautics 20 Local MS Programs 22 Linked Programs with Beihang University 31 Linked Programs with Northwestern Polytechnic University 49 Department of Electrical Engineering 51 Local MS Programs 53 Linked Programs with University of Surrey 55 Department of Materials Science & Engineering 72 Department of Mechanical Engineering 81 Department of Remote Sensing & Geo-information Science 100 w w w . i s t . e d u . p k Department of Space Science 106 ORIC 123 Admissions 125 Fee Structure 127 Academic Regulations 130 Faculty 133 Administration 143 Location Map 145 1 20 P R O S P E C T U S 2 141 INSTITUTE OF SPACE TECHNOLOGY w w w . i s t . e d u . p k 2 141 P R O S P E C T U S INSTITUTE OF SPACE TECHNOLOGY Welcome Message Vice Chancellor The Institute of Space Technology welcomes all the students who aspire to enhance their knowledge and specialize in cutting edge technologies.
    [Show full text]
  • Comparing Two Tools for Mobile-Device Forensics
    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS COMPARING TWO TOOLS FOR MOBILE-DEVICE FORENSICS by Casandra M. Martin September 2016 Thesis Advisor: Neil C. Rowe Second Reader: Approved for public release. Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202–4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave Blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED September 2016 Master’s Thesis 09-20-2015 to 09-23-2016 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS COMPARING TWO TOOLS FOR MOBILE-DEVICE FORENSICS 6. AUTHOR(S) Casandra M. Martin 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER Naval Postgraduate School Monterey, CA 93943 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING AGENCY REPORT NUMBER N/A 11. SUPPLEMENTARY NOTES The views expressed in this document are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.
    [Show full text]
  • Samsung Products (Wholesale and Retail)
    PRICE LIST FOR SAMSUNG PRODUCTS (WHOLESALE AND RETAIL) Samsung S-Series Wholesale Retail Price Samsung Galaxy Note 20 Ultra 256GB 8GB $700 $1,100 Samsung Galaxy Note 20 256GB 8GB $600 $950 Samsung Galaxy S20 Ultra 128GB 12GB $600 $950 Samsung Galaxy S20+ 28GB 8GB $550 $850 Samsung Galaxy S20 128GB 8GB $500 $800 Samsung Galaxy Note10+ 5G 256GB $600 $950 Samsung Galaxy Note10+ 256GB $550 $850 Samsung Galaxy Note10 5G 256GB $500 $800 Samsung Galaxy Note10 256GB $450 $750 Samsung Galaxy S10 5G 128GB $500 $850 Samsung Galaxy S10+ 128GB $350 $600 Samsung Galaxy S10 128GB $260 $440 Samsung Galaxy Note 9 128GB $300 $500 Samsung Galaxy Note 8 64GB $280 $450 Samsung Galaxy S9 64GB $250 $420 Samsung Galaxy S8+ 64GB $220 $400 Samsung Galaxy S8 64GB $200 $350 Samsung Galaxy Note 7 64GB $180 $300 Samsung Galaxy S7 Edge 64GB $180 $300 Samsung Galaxy S7 64GB $150 $280 Samsung Galaxy S6 Edge + 64GB $120 $250 Samsung Galaxy S6 Edge Unlocked 64GB $110 $230 Samsung Galaxy S6 Unlocked 64GB $100 $200 Samsung A-Series Wholesale Retail Price Samsung Galaxy A70s 128GB $350 $550 Samsung Galaxy A20s 64GB $90 $150 Samsung Galaxy A30s 128GB $220 $400 Samsung Galaxy A50s 128GB $230 $430 Samsung Galaxy A90 5G 128GB $230 $430 Samsung Galaxy A90 128GB $250 $450 Samsung Galaxy A10s 64GB $100 $200 Samsung Galaxy A80 64GB $150 $250 Samsung Galaxy A70 64GB $120 $170 Samsung Galaxy A60 64GB $90 $150 Samsung Galaxy A50 128GB $120 $170 Samsung Galaxy A40 64GB $210 $380 Samsung Galaxy A30 64GB $70 $120 Samsung Galaxy A20e 64GB $170 $270 Samsung Galaxy A20 64GB $60 $100 Samsung
    [Show full text]